Privacy and Processes
|
|
- Isaac Harrison
- 8 years ago
- Views:
Transcription
1 1 Privacy and Processes Ciarán Bryce PRIAM Saint Malo May Definition of a Process 2! A general method of doing something, involving steps or operations which are usually ordered and/or interdependent.! E.g., in manufacturing, organizations, software development, etc.! A business process is a set of linked activities that create value by transforming an input into a more valuable output. Both input and output can be artifacts and/or information and the transformation can be performed by human actors, machines, or both.
2 Why Processes are Important 3! Information system is subject to technical, organizational and legal constraints! Organizational! Applying patches and measuring effectiveness of patches,! Analyzing user behavior for application preferences and evolution of system! Ensuring people who need documents have access! Legal! Document archival for Sarbanes Oxley! Digital Restrictions Management (e.g., for software licensing)! Personal Data protection Why Processes are Important 4! Technical solutions have less and less significance! E.g., Most effective anti-virus is coherent and rigorous patching policy! Information system is an organizational bottleneck! To be agile, need to abstract IT to match roles and objectives of organization! IT Challenge is integration! Companies need architects, not programmers! Written formal description of process permits! Comparison, optimisation and analysis (e.g., for business continuity, etc.)! Foundation for execution
3 Processes versus Applications 5 Application Process Defined as Actors involved Role in organization Reliability/Availability Security Efficiency Code base Programmer, user Asset Fault Tolerance (software and hardware faults) Cryptography, access control, etc. CPU cycles, memory space, etc. Set of activities working towards precise goal Programmer, manager, operator, certifier, client, user, etc. Expresses business or organizational model Business Continuity (Bird flu, computer failure, stock market crash) Employee screening, key management, SOX compliance, etc. Man-hours, cost, sales, business intelligence. Processes in PRIAM 6! CNIL and Garante directives! Implementing them and verifying them! In functional model, the auditor is a role!! Who is permitted this role? What are associated rights? etc.! Knowledge Management is a process issue! Someone has to define ontologies - and someone has to define who that someone is! TPM management is a process issue! Roles of privacy CA need to managed: security depends on this! Software provider of functional model layer is a principal!
4 7 Example of Motivation for Process Support and challenges The EDOS Project - improving the quality of an open source distribution. Background 8! Linux is not a product. Rather, Linux is a collection of software components, individually crafted by thousands of independent hands around the world, with each component changing and evolving on its own independent Ian Murdock, timetable. creator. Linux of the is Debian not a product. projecit is a process. Ian Murdock, founder of the Debian project.! The more F/OSS users, the better!. In principle.
5 Background 9! Building a distribution involves! Producing and Collecting software! Configuring/compiling with respect to the dependencies! Quality Assurance (Testing)! Distributing to clients : boxes and download! These activities are currently tackled separately! List is not exhaustive, e.g.,! Training of developers! Scouting for clients!.! All part of the F/OSS process 10 F/OSS Environment Defects Management Production Management Version Dependency Management Community Platform Package Distribution Distribution Management Bug Test Projects Management Role ConfigurationMetric Documentation Release Tests Management Process Feedback Roles Management Application Project Activity Management Need for a transversal view of whole F/OSS process
6 F/OSS Process 11! Process! A community of actors who consume and produce resources! A multitude of activities and tools! A number of roles for activity organisation! Lack of activity coordination and performance metering leads to process inefficiency! Structured process management leads to improvement, e.g. in F/OSS,! Ontology activity that defines and binds attributes to actors and resources for more flexible lookup, e.g.,! Find package that has been tested on Mandrivalinux 10.1 with Ethernet card enabled! Find developer with experience in cryptography and Java programming! Find someone willing to act as a secondary server administrator Process Reference Model (version 1) 12! Represents the main data types used in a F/OSS process! Represents content and community in a uniform manner! Models management of any activity in the F/OSS Process! Models evolution of projects, i.e., addition and integration of new activities! The PRM provides a model of F/OSS artefacts and activities that manage these artefacts! Current format of PRM: formal model and Java API
7 PRM Model 13! The Information model binds meta-data (attributes) to artefacts! Used to lookup artefacts! E.g., find Java packages with RSA implementations! Lookup takes attribute Boolean algebra expressions! E.g., find Java cryptography packages from official mirror servers or trusted peers! Substitutability! Best match semantics in look-up! The model also defines primitives to create and lookup artifacts based on attributes! These enable F/OSS activities to be coordinated! E.g., pipeline all reported errors on package to competent developer! Lookup blocks until create of artefact with matching attributes Examples of Attributes 14 Actor Unit of Content Contact Information Knowledge Competences Interests License Version Type Target architecture Dependencies Conflicts Et cetera! Actors and content are equally important to process! Code and documentation are equally important
8 PRM Elements 15 PRM Elements Artifact Project Actor Activity Integrity Rule Right Event Process Role Task Metric Log! Core PRM Elements represent the minimal set of Artifacts for handling! Community, Projects, Resources, Responsibilities, Measurement, Etc.! Artifacts! Managed by PRM activities! Located via attributes Core PRM Activities 16 PRM Activities Artifact Artifact Management Project Project Management Actor Community Management Activity Activities Management Integrity Rule Rights Management Right Event Management Event Process Management Process Role Management Role Task Management Task Metrics Management Metric Logs Management Log Evolution? = New Activity! An activity defines a set of operations that manage artifacts and integrity rules! e.g., No version exists between old and new version for code artifacts
9 PRM Activity Interaction 17! Challenge in implementing processes is handling legacy code! Applications and Activity implementations have to communicate through the interfaces provided by the Activities Application Activity 1 Activity 2 Activity 3 PRM Model Interaction with PRM Elements Implementation 1 Implementation 2 Implementation 3 Examples of PRM Operations 18! Artifact Management! registerartifacttype(type Directory, Valuation Directory, P IR, Project):Type! newartifact(type, Value Directory, Project):! lookup(directory, Project):PArtifact! exists(artifact):boolean! substitutable(artifact, Artifact):Boolean! Activity Management! declareactivity(name, P(lambda, P IR)):Activity! associateactivity(activity, Project):void! lookup(directory):partifact! exists(activity):boolean! isassociated(activity, Project):Boolean
10 Metrics handling 19! Fundamental goal of process infrastructure is to measure and meter activities! Individual activities can have metrics (e.g., number of bug reports per package)! Or are bound to specific implementation tools! Challenge is to convert metrics to KPIs! Useful KPIs in PRIAM! Number of reported privacy violations! Relation of number of auditors to claimed violations! Relation of TPM use to reported violations! Ease of integration of functional architecture Handling metrics through the PRM 20! Creation! new Metric(description, viewpoint, metric set[], occurrence, execution)! Lookup! find(directory) -> Metric[]! Evaluation! evaluate(project, Metric) -> value! Observation! observe(project, Metric, Value) -> wait for event (metric value reached)
11 21 Current Work on the PRM Ciaran Bryce (INRIA) Olivier Abdoun (INRIA) Chrislain Razafimahefa (Shared Object) Stéphane Laurière (Mandriva) Michel Pawlak (University of Geneva) Current Work 22! Separate core process support from F/OSS support! Development of process language and (JavaCC) compiler! SOA/BPM Project! Mapping PRM to SOA infrastructure! Qualipso! Refining OSS part of PRM! Code, code, code! Aiming for release in July (Apache 2 License)
12 23 24 Architectural Overview OSS Forge TPM Identity Management PRIAM on Functional Model BP PRM Default PRM Implementation Knowledge Management Software Evolution Legacy systems (SOA, ) Apache Licence 2, except for BP parts
13 Abstract Architecture Corporate Legal 25 User and Service layer Activities Content Community Policy Kernel Layer Community Management Content Management Ontology Management Activity Management License Management Software Management Virtual Machine Native OS (e.g., Linux) Architectural Layer
Virtual Server and Storage Provisioning Service. Service Description
RAID Virtual Server and Storage Provisioning Service Service Description November 28, 2008 Computer Services Page 1 TABLE OF CONTENTS INTRODUCTION... 4 VIRTUAL SERVER AND STORAGE PROVISIONING SERVICE OVERVIEW...
More informationRed Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment
Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Network (RHN) Satellite server is an easy-to-use, advanced systems management platform
More informationRed Hat Satellite Management and automation of your Red Hat Enterprise Linux environment
Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Satellite server is an easy-to-use, advanced systems management platform for your Linux infrastructure.
More informationChapter 9 Software Evolution
Chapter 9 Software Evolution Summary 1 Topics covered Evolution processes Change processes for software systems Program evolution dynamics Understanding software evolution Software maintenance Making changes
More informationForeword. Contents. Edos - Sixth Framework Programme - Priority 2 1
Edos Glossary Project Title Edos Project Number IST-004312 Contact Authors Ciarán Bryce, Michel Deriaz, Michel Pawlak Author List Ciarán Bryce, Michel Deriaz, Michel Pawlak,... Workpackage Number WP 4
More informationSoftware Engineering. So(ware Evolu1on
Software Engineering So(ware Evolu1on 1 Software change Software change is inevitable New requirements emerge when the software is used; The business environment changes; Errors must be repaired; New computers
More informationAssurance of Open Source Projects
Assurance of Open Source Projects Dr Graham Oakes Founder and Principal, Graham Oakes Ltd Contents The value of Open Source Software (OSS) Two types of OSS project The challenges of implementing OSS systems
More informationAgent Languages. Overview. Requirements. Java. Tcl/Tk. Telescript. Evaluation. Artificial Intelligence Intelligent Agents
Agent Languages Requirements Overview Java Tcl/Tk Telescript Evaluation Franz J. Kurfess, Cal Poly SLO 211 Requirements for agent Languages distributed programming large-scale (tens of thousands of computers)
More informationZend Server 4.0 Beta 2 Release Announcement What s new in Zend Server 4.0 Beta 2 Updates and Improvements Resolved Issues Installation Issues
Zend Server 4.0 Beta 2 Release Announcement Thank you for your participation in the Zend Server 4.0 beta program. Your involvement will help us ensure we best address your needs and deliver even higher
More informationAPPENDIX 1 A STUDY ON EXPLORING THE IMPACT OF RELEASE MANAGEMENT TO ENHANCE THE QUALITY OF OPEN SOURCE SOFTWARE PROJECT MANAGEMENT
177 APPENDIX 1 A STUDY ON EXPLORING THE IMPACT OF RELEASE MANAGEMENT TO ENHANCE THE QUALITY OF OPEN SOURCE SOFTWARE PROJECT MANAGEMENT QUESTIONNAIRE I. Personal and Socio-Economic Profile 1. Located in:
More informationWhite paper: Unlocking the potential of load testing to maximise ROI and reduce risk.
White paper: Unlocking the potential of load testing to maximise ROI and reduce risk. Executive Summary Load testing can be used in a range of business scenarios to deliver numerous benefits. At its core,
More informationDistributed File Systems
Distributed File Systems Paul Krzyzanowski Rutgers University October 28, 2012 1 Introduction The classic network file systems we examined, NFS, CIFS, AFS, Coda, were designed as client-server applications.
More informationTowards Trusted Semantic Service Computing
Towards Trusted Semantic Service Computing Michel Deriaz University of Geneva, Switzerland Abstract. This paper describes a new prototype of a semantic Service Oriented Architecture (SOA) called Spec Services.
More informationHadoop and Map-Reduce. Swati Gore
Hadoop and Map-Reduce Swati Gore Contents Why Hadoop? Hadoop Overview Hadoop Architecture Working Description Fault Tolerance Limitations Why Map-Reduce not MPI Distributed sort Why Hadoop? Existing Data
More informationOW2 migration to Xsalto
OW2 migration to Xsalto 10 th july 2007 Armel Lannois Table of Content ObjectWeb architecture overview Actual OW2 Servers overview Problems Opportunities OW2 architecture Migration plan Tasks 2 ObjectWeb
More informationUniversidad Simón Bolívar
Cardinale, Yudith Figueira, Carlos Hernández, Emilio Baquero, Eduardo Berbín, Luis Bouza, Roberto Gamess, Eric García, Pedro Universidad Simón Bolívar In 1999, a couple of projects from USB received funding
More informationProgrammable Networking with Open vswitch
Programmable Networking with Open vswitch Jesse Gross LinuxCon September, 2013 2009 VMware Inc. All rights reserved Background: The Evolution of Data Centers Virtualization has created data center workloads
More informationProcess Improvement. Process improvement. Process improvement stages. Understanding, Modelling and Improving the Software Process
Process Improvement Understanding, Modelling and Improving the Software Process Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 31 Slide 1 Process improvement Understanding existing processes
More informationChapter 11 Map-Reduce, Hadoop, HDFS, Hbase, MongoDB, Apache HIVE, and Related
Chapter 11 Map-Reduce, Hadoop, HDFS, Hbase, MongoDB, Apache HIVE, and Related Summary Xiangzhe Li Nowadays, there are more and more data everyday about everything. For instance, here are some of the astonishing
More informationOpen source business rules management system
JBoss Enterprise BRMS Open source business rules management system What is it? JBoss Enterprise BRMS is an open source business rules management system that enables easy business policy and rules development,
More informationStructure of Presentation. The Role of Programming in Informatics Curricula. Concepts of Informatics 2. Concepts of Informatics 1
The Role of Programming in Informatics Curricula A. J. Cowling Department of Computer Science University of Sheffield Structure of Presentation Introduction The problem, and the key concepts. Dimensions
More informationHDFS Users Guide. Table of contents
Table of contents 1 Purpose...2 2 Overview...2 3 Prerequisites...3 4 Web Interface...3 5 Shell Commands... 3 5.1 DFSAdmin Command...4 6 Secondary NameNode...4 7 Checkpoint Node...5 8 Backup Node...6 9
More informationRoverPal - A Mobile Payment Application
White Paper RoverPal - A Mobile Payment Application Introduction Online shopping has been a favorable experience with most of us. Still, we come across instances where we are out on shopping and we run
More informationSystems Software. Introduction to Information System Components. Chapter 1 Part 2 of 4 CA M S Mehta, FCA
Systems Software Introduction to Information System Components Chapter 1 Part 2 of 4 CA M S Mehta, FCA 1 Systems Software Learning Objects Task Statements 1.1 Identify deployment of different components
More informationDreamFactory Security Whitepaper Customer Information about Privacy and Security
DreamFactory Security Whitepaper Customer Information about Privacy and Security DreamFactory Software publishes rich applications for salesforce.com. All of our products for salesforce use the DreamFactory
More informationUBS Training Course Catalog
2014 COURSE CATALOG SECURITY COURSES Advanced Ethical Hacking Secure Android Development Secure ios Development C/C++ Programming Security Complete Windows Security Cryptography Overview Designing Secure
More informationVMWARE Introduction ESX Server Architecture and the design of Virtual Machines
Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................
More informationERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
More informationCross platform Migration of SAS BI Environment: Tips and Tricks
ABSTRACT Cross platform Migration of SAS BI Environment: Tips and Tricks Amol Deshmukh, California ISO Corporation, Folsom, CA As a part of organization wide initiative to replace Solaris based UNIX servers
More informationChristchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard
Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard Corporate Policies & Procedures Section 1: General Administration Document
More informationHow To Use The Dcml Framework
DCML Framework Use Cases Introduction Use Case 1: Monitoring Newly Provisioned Servers Use Case 2: Ensuring Accurate Asset Inventory Across Multiple Management Systems Use Case 3: Providing Standard Application
More informationOperating Systems 4 th Class
Operating Systems 4 th Class Lecture 1 Operating Systems Operating systems are essential part of any computer system. Therefore, a course in operating systems is an essential part of any computer science
More informationPrepared By : Manoj Kumar Joshi & Vikas Sawhney
Prepared By : Manoj Kumar Joshi & Vikas Sawhney General Agenda Introduction to Hadoop Architecture Acknowledgement Thanks to all the authors who left their selfexplanatory images on the internet. Thanks
More informationESB Features Comparison
ESB Features Comparison Feature wise comparison of Mule ESB & Fiorano ESB Table of Contents A note on Open Source Software (OSS) tools for SOA Implementations... 3 How Mule ESB compares with Fiorano ESB...
More informationComponents of a Computer System
SFWR ENG 3B04 Software Design III 1.1 3 Hardware Processor(s) Memory I/O devices Operating system Kernel System programs Components of a Computer System Application programs Users SFWR ENG 3B04 Software
More informationLocal Area Networks: Software and Support Systems
Local Area Networks: Software and Support Systems Chapter 8 Learning Objectives After reading this chapter, you should be able to: Identify the main functions of operating systems and network operating
More informationDatavetenskapligt Program (kandidat) Computer Science Programme (master)
Datavetenskapligt Program (kandidat) Computer Science Programme (master) Wolfgang Ahrendt Director Datavetenskap (BSc), Computer Science (MSc) D&IT Göteborg University, 30/01/2009 Part I D&IT: Computer
More informationOracle SOA Suite/B2B as a Critical Mission Hub for a High Volume Message Use Case
Oracle SOA Suite/B2B as a Critical Mission Hub for a High Volume Message Use Case Introduction Stop. Think. Ok, in the meanwhile 2 seconds has passed and 250 messages more were processed by a mission critical
More informationUsing Tableau Software with Hortonworks Data Platform
Using Tableau Software with Hortonworks Data Platform September 2013 2013 Hortonworks Inc. http:// Modern businesses need to manage vast amounts of data, and in many cases they have accumulated this data
More informationSoftware Project Measurement
Software Project Measurement We can t accurately measure software, yet we must have measures if we are to understand large-scale design. This lecture discusses: the practical aims of measurement; the measures
More informationBig Data Trends and HDFS Evolution
Big Data Trends and HDFS Evolution Sanjay Radia Founder & Architect Hortonworks Inc Page 1 Hello Founder, Hortonworks Part of the Hadoop team at Yahoo! since 2007 Chief Architect of Hadoop Core at Yahoo!
More informationLECTURES NOTES Organisational Aspects of Software Development
LECTURES NOTES Organisational Aspects of Software Development Pedro Contreras Department of Computer Science Royal Holloway, University of London Egham, Surrey TW20 0EX, UK pedro@cs.rhul.ac.uk 1. Introduction
More informationExample of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
More informationEvolution from the Traditional Data Center to Exalogic: An Operational Perspective
An Oracle White Paper July, 2012 Evolution from the Traditional Data Center to Exalogic: 1 Disclaimer The following is intended to outline our general product capabilities. It is intended for information
More informationVMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D
ware and CPU Virtualization Technology Jack Lo Sr. Director, R&D This presentation may contain ware confidential information. Copyright 2005 ware, Inc. All rights reserved. All other marks and names mentioned
More informationClient Overview. Engagement Situation
Client Overview Our client is a provider of Operational Analytics and Visualization solutions for cloud/datacenters that enables IT function of an organization to monitor, and plan complex cloud and data
More informationAn Introduction to Software Development Process and Collaborative Work
Organisational Aspects of Software Development Pedro Contreras Department of Computer Science Royal Holloway, University of London January 29, 2008 Introduction Creating software is a complex task. Organising
More informationSatish Mohan. Head Engineering. AMD Developer Conference, Bangalore
Satish Mohan Head Engineering AMD Developer Conference, Bangalore Open source software Allows developers worldwide to collaborate and benefit. Strategic elimination of vendor lock in OSS naturally creates
More informationA REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM
A REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM Sneha D.Borkar 1, Prof.Chaitali S.Surtakar 2 Student of B.E., Information Technology, J.D.I.E.T, sborkar95@gmail.com Assistant Professor, Information
More informationBest Practices for Monitoring Databases on VMware. Dean Richards Senior DBA, Confio Software
Best Practices for Monitoring Databases on VMware Dean Richards Senior DBA, Confio Software 1 Who Am I? 20+ Years in Oracle & SQL Server DBA and Developer Worked for Oracle Consulting Specialize in Performance
More informationNavigate Your Way to PCI DSS Compliance
Whitepaper Navigate Your Way to PCI DSS Compliance The Payment Card Industry Data Security Standard (PCI DSS) is a series of IT security standards that credit card companies must employ to protect cardholder
More informationGETTING STARTED WITH MANAGED SERVICES
GETTING STARTED WITH MANAGED SERVICES There are basic aspects of I.T. that true managed service providers should be taking into consideration when providing services to companies. Our checklist should
More informationDriving workload automation across the enterprise
IBM Software Thought Leadership White Paper October 2011 Driving workload automation across the enterprise Simplifying workload management in heterogeneous environments 2 Driving workload automation across
More informationConstruction of SaaS-Based e-learning System in Japan
Construction of SaaS-Based e-learning System in Japan Norihiko Sakamoto (Manuscript received January 30, 2009) Fujitsu s electronic learning (e-learning) application began to be offered in Japan in the
More informationITU-T Kaleidoscope Conference Innovations in NGN. Managing NGN using the SOA Philosophy. Y. Fun Hu University of Bradford y.f.hu@bradford.ac.
ITU-T Kaleidoscope Conference Innovations in NGN Managing NGN using the SOA Philosophy Y. Fun Hu University of Bradford y.f.hu@bradford.ac.uk Next Generation Network (NGN) A IP/IMS based network Provide
More informationDB2 Connect for NT and the Microsoft Windows NT Load Balancing Service
DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service Achieving Scalability and High Availability Abstract DB2 Connect Enterprise Edition for Windows NT provides fast and robust connectivity
More informationSystem Structures. Services Interface Structure
System Structures Services Interface Structure Operating system services (1) Operating system services (2) Functions that are helpful to the user User interface Command line interpreter Batch interface
More informationExploring Oracle E-Business Suite Load Balancing Options. Venkat Perumal IT Convergence
Exploring Oracle E-Business Suite Load Balancing Options Venkat Perumal IT Convergence Objectives Overview of 11i load balancing techniques Load balancing architecture Scenarios to implement Load Balancing
More informationPerformance Monitoring and Analysis System for MUSCLE-based Applications
Polish Infrastructure for Supporting Computational Science in the European Research Space Performance Monitoring and Analysis System for MUSCLE-based Applications W. Funika, M. Janczykowski, K. Jopek,
More informationWhite Paper. Software Development Best Practices: Enterprise Code Portal
White Paper Software Development Best Practices: Enterprise Code Portal An Enterprise Code Portal is an inside the firewall software solution that enables enterprise software development organizations
More informationNetwork operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation.
NETWORK OPERATING SYSTEM Introduction Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation. Network operating
More informationOrganisation data architecture with standards connections
Organisation data architecture with standards connections Arthur Haynes Principal Data Architect Siemens Business Services (formerly BBC Technology) Providing a Data Integration Service!Enable a Media
More informationSTeP-IN SUMMIT 2013. June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case)
10 th International Conference on Software Testing June 18 21, 2013 at Bangalore, INDIA by Sowmya Krishnan, Senior Software QA Engineer, Citrix Copyright: STeP-IN Forum and Quality Solutions for Information
More informationx86 ISA Modifications to support Virtual Machines
x86 ISA Modifications to support Virtual Machines Douglas Beal Ashish Kumar Gupta CSE 548 Project Outline of the talk Review of Virtual Machines What complicates Virtualization Technique for Virtualization
More informationFundamentals of Information Governance:
Fundamentals of Information Governance: More than just records management PETER KURILECZ CRM CA IGP Hard as I try, I simply cannot make myself understand how Information Governance isn t just a different
More informationLinux Distributions. What they are, how they work, which one to choose. avix@br.ibm.com> +55-11-2132-2327. Avi Alkalay <avix@br.ibm.
Linux Distributions What they are, how they work, which one to choose Avi Alkalay +55-11-2132-2327 Linux, Open Standards Consultant IBM Corporation Before You Start...
More informationA Project Summary: VMware ESX Server to Facilitate: Infrastructure Management Services Server Consolidation Storage & Testing with Production Servers
A Project Summary: VMware ESX Server to Facilitate: Infrastructure Management Services Server Consolidation Storage & Testing with Production Servers Srinivas P Reddy - 16 th March 2006 srinivasp@vensoft.com
More informationUse service virtualization to remove testing bottlenecks
Use service virtualization to remove testing bottlenecks Discover integration faults early by pushing integration testing left in the software lifecycle Contents 1 Complex, interconnected applications
More informationSplunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Businesses around the world have adopted the information security standard ISO 27002 as part of their overall risk
More informationChapter 11 Distributed File Systems. Distributed File Systems
Chapter 11 Distributed File Systems Introduction Case studies NFS Coda 1 Distributed File Systems A distributed file system enables clients to access files stored on one or more remote file servers A file
More informationState of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)
State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) Document Revision History Date Version Creator Notes File Transfer Protocol Service Page 2 7/7/2011 Table of Contents
More informationWhat is virtualization
Virtualization Concepts Virtualization Virtualization is the process of presenting computing resources in ways that users and applications can easily get value out of them, rather than presenting them
More informationBusinessObjects XI R2 Product Documentation Roadmap
XI R2 Product Documentation Roadmap XI R2 indows and UNIX Patents Trademarks Copyright Third-party contributors Business Objects owns the following U.S. patents, which may cover products that are offered
More informationSCALABLE DATA SERVICES
1 SCALABLE DATA SERVICES 2110414 Large Scale Computing Systems Natawut Nupairoj, Ph.D. Outline 2 Overview MySQL Database Clustering GlusterFS Memcached 3 Overview Problems of Data Services 4 Data retrieval
More informationApplication Architectures
Software Engineering Application Architectures Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To explain the organization of two fundamental models of business systems - batch
More informationJAVA WEB START OVERVIEW
JAVA WEB START OVERVIEW White Paper May 2005 Sun Microsystems, Inc. Table of Contents Table of Contents 1 Introduction................................................................. 1 2 A Java Web Start
More informationOracle Business Activity Monitoring 11g New Features
Oracle Business Activity Monitoring 11g New Features Gert Schüßler Principal Sales Consultant Oracle Deutschland GmbH Agenda Overview Architecture Enterprise Integration Framework
More informationApplication Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008
7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned
More information<Insert Picture Here> Private Cloud with Fusion Middleware
Private Cloud with Fusion Middleware Duško Vukmanović Principal Sales Consultant, Oracle dusko.vukmanovic@oracle.com The following is intended to outline our general product direction.
More informationOSGi Remote Management
OSGi Remote Management INCREASE OUR Date 20-11-2006 Miguel García Longarón - mgl@tid.es Present situation OSGi is being applied in several domains Each domain has own solution for remote management Home
More informationAlliance Key Manager A Solution Brief for Technical Implementers
KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key
More informationThe IBM data governance blueprint: Leveraging best practices and proven technologies
May 2007 The IBM data governance blueprint: Leveraging best practices and proven technologies Page 2 Introduction In the past few years, dozens of high-profile incidents involving process failures and
More informationVirtualization s Evolution
Virtualization s Evolution Expect more from your IT solutions. Virtualization s Evolution In 2009, most Quebec businesses no longer question the relevancy of virtualizing their infrastructure. Rather,
More information12. Introduction to Virtual Machines
12. Introduction to Virtual Machines 12. Introduction to Virtual Machines Modern Applications Challenges of Virtual Machine Monitors Historical Perspective Classification 332 / 352 12. Introduction to
More informationBrocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1
PKI Tutorial Jim Kleinsteiber February 6, 2002 Page 1 Outline Public Key Cryptography Refresher Course Public / Private Key Pair Public-Key Is it really yours? Digital Certificate Certificate Authority
More informationAugmented Search for Software Testing
Augmented Search for Software Testing For Testers, Developers, and QA Managers New frontier in big log data analysis and application intelligence Business white paper May 2015 During software testing cycles,
More informationGECKO Software. Introducing FACTORY SCHEMES. Adaptable software factory Patterns
Introducing FACTORY SCHEMES Adaptable software factory Patterns FACTORY SCHEMES 3 Standard Edition Community & Enterprise Key Benefits and Features GECKO Software http://consulting.bygecko.com Email: Info@gecko.fr
More informationHow To Understand The History Of The Web (Web)
(World Wide) Web WWW A way to connect computers that provide information (servers) with computers that ask for it (clients like you and me) uses the Internet, but it's not the same as the Internet URL
More informationMulti-core Programming System Overview
Multi-core Programming System Overview Based on slides from Intel Software College and Multi-Core Programming increasing performance through software multi-threading by Shameem Akhter and Jason Roberts,
More informationReplacing vcenter Server 4.0 Certificates VMware vsphere 4.0
Technical Note Replacing vcenter Server 4.0 Certificates VMware vsphere 4.0 Certificates are automatically generated when you install vcenter Server and ESX/ESXi. These default certificates are not signed
More informationBasic Unix/Linux 1. Software Testing Interview Prep
Basic Unix/Linux 1 Programming Fundamentals and Concepts 2 1. What is the difference between web application and client server application? Client server application is designed typically to work in a
More informationDeveloping SOA solutions using IBM SOA Foundation
Developing SOA solutions using IBM SOA Foundation Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 4.0.3 4.0.3 Unit objectives After completing this
More informationTrustworthy Computing
Stefan Thom Senior Software Development Engineer and Security Architect for IEB, Microsoft Rob Spiger, Senior Security Strategist Trustworthy Computing Agenda Windows 8 TPM Scenarios Hardware Choices with
More informationCloud Data Protection for the Masses
Cloud Data Protection for the Masses N.Janardhan 1, Y.Raja Sree 2, R.Himaja 3, 1,2,3 {Department of Computer Science and Engineering, K L University, Guntur, Andhra Pradesh, India} Abstract Cloud computing
More informationShared Services Canada. Cloud Computing
Shared Services Canada Cloud Computing Architecture Framework Advisory Committee Transformation, Service Strategy and Design January 28, 2013 1 Agenda TIME TOPICS PRESENTER(S) 09:00 9:15 Opening Remarks
More informationRestraining Execution Environments
Restraining Execution Environments Segurança em Sistemas Informáticos André Gonçalves Contents Overview Java Virtual Machine: Overview The Basic Parts Security Sandbox Mechanisms Sandbox Memory Native
More informationAn InControl Technology White Paper
An InControl Technology White Paper Defining Asset Intelligence and the evolution from IT inventory InControl Technology, Inc. 4025 Camino Del Rio South, Suite 300 San Diego, CA 92108 Phone: (1) 619.542.7732
More informationVirtualization for Cloud Computing
Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources
More informationHRG Assessment: Stratus everrun Enterprise
HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at
More informationOPERATING SYSTEM SERVICES
OPERATING SYSTEM SERVICES USER INTERFACE Command line interface(cli):uses text commands and a method for entering them Batch interface(bi):commands and directives to control those commands are entered
More information